Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

20/11/2024, 03:24

241120-dygwtazhpm 10

20/11/2024, 03:19

241120-dvgrmsvjbr 10

20/11/2024, 03:07

241120-dmd1saygrg 10

Analysis

  • max time kernel
    136s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 03:19

General

  • Target

    XWorm V5.6.7z - Copy/XWorm V5.6/Plugins/Chat.dll

  • Size

    18KB

  • MD5

    59f75c7ffaccf9878a9d39e224a65adf

  • SHA1

    46b0f61a07e85e3b54b728d9d7142ddc73c9d74b

  • SHA256

    aab20f465955d77d6ec3b5c1c5f64402a925fb565dda5c8e38c296cb7406e492

  • SHA512

    80056163b96ce7a8877874eaae559f75217c0a04b3e3d4c1283fe23badfc95fe4d587fd27127db4be459b8a3adf41900135ea12b0eeb4187adbcf796d9505cb8

  • SSDEEP

    384:4MOna4ifKQtuUvl0BY0iYUsBG/crwTKvh6GIKoIafWUWmfN:vKQtuq2Y0lUUG0r0pIafWXe

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\XWorm V5.6.7z - Copy\XWorm V5.6\Plugins\Chat.dll",#1
    1⤵
      PID:4536
    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\MeasureClose.xlsm"
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4212

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4212-0-0x00007FFB1F2D0000-0x00007FFB1F2E0000-memory.dmp

      Filesize

      64KB

    • memory/4212-1-0x00007FFB5F2ED000-0x00007FFB5F2EE000-memory.dmp

      Filesize

      4KB

    • memory/4212-5-0x00007FFB1F2D0000-0x00007FFB1F2E0000-memory.dmp

      Filesize

      64KB

    • memory/4212-4-0x00007FFB1F2D0000-0x00007FFB1F2E0000-memory.dmp

      Filesize

      64KB

    • memory/4212-3-0x00007FFB1F2D0000-0x00007FFB1F2E0000-memory.dmp

      Filesize

      64KB

    • memory/4212-2-0x00007FFB1F2D0000-0x00007FFB1F2E0000-memory.dmp

      Filesize

      64KB

    • memory/4212-8-0x00007FFB5F250000-0x00007FFB5F445000-memory.dmp

      Filesize

      2.0MB

    • memory/4212-10-0x00007FFB5F250000-0x00007FFB5F445000-memory.dmp

      Filesize

      2.0MB

    • memory/4212-11-0x00007FFB5F250000-0x00007FFB5F445000-memory.dmp

      Filesize

      2.0MB

    • memory/4212-7-0x00007FFB5F250000-0x00007FFB5F445000-memory.dmp

      Filesize

      2.0MB

    • memory/4212-12-0x00007FFB5F250000-0x00007FFB5F445000-memory.dmp

      Filesize

      2.0MB

    • memory/4212-6-0x00007FFB5F250000-0x00007FFB5F445000-memory.dmp

      Filesize

      2.0MB

    • memory/4212-9-0x00007FFB5F250000-0x00007FFB5F445000-memory.dmp

      Filesize

      2.0MB

    • memory/4212-13-0x00007FFB1C970000-0x00007FFB1C980000-memory.dmp

      Filesize

      64KB

    • memory/4212-14-0x00007FFB1C970000-0x00007FFB1C980000-memory.dmp

      Filesize

      64KB

    • memory/4212-16-0x00007FFB5F250000-0x00007FFB5F445000-memory.dmp

      Filesize

      2.0MB

    • memory/4212-17-0x00007FFB5F250000-0x00007FFB5F445000-memory.dmp

      Filesize

      2.0MB

    • memory/4212-18-0x00007FFB5F250000-0x00007FFB5F445000-memory.dmp

      Filesize

      2.0MB

    • memory/4212-15-0x00007FFB5F250000-0x00007FFB5F445000-memory.dmp

      Filesize

      2.0MB

    • memory/4212-28-0x00007FFB5F250000-0x00007FFB5F445000-memory.dmp

      Filesize

      2.0MB

    • memory/4212-29-0x00007FFB5F2ED000-0x00007FFB5F2EE000-memory.dmp

      Filesize

      4KB